Aegis-BPF

Incident Response Runbook

This runbook assumes the agent is managed by systemd and events are emitted as JSON either to stdout or journald.

Quick triage

Identify the offender

Events include pid, ppid, cgid, comm, path, and action.

Mitigation options

  1. Temporary allowlist: sudo aegisbpf allow add /sys/fs/cgroup/<service>
  2. Remove a deny entry: sudo aegisbpf block del /path
  3. Update the policy and re-apply: sudo aegisbpf policy apply <file> --reset
  4. Switch to audit mode:
    • Edit /etc/default/aegisbpf and set AEGIS_MODE=--audit
    • sudo systemctl restart aegisbpf
  5. Emergency stop: sudo systemctl stop aegisbpf

Evidence collection

Automated collection:

This creates a compressed evidence bundle with health, metrics, policy, service status, and recent journald logs.